Patents by Inventor Kapaleeswaran VISWANATHAN
Kapaleeswaran VISWANATHAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11082673Abstract: Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.Type: GrantFiled: September 19, 2019Date of Patent: August 3, 2021Assignee: THE BOEING COMPANYInventors: Shubham Tripathi, Kapaleeswaran Viswanathan, Arun Ayyagari
-
Patent number: 10887087Abstract: An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.Type: GrantFiled: August 21, 2019Date of Patent: January 5, 2021Assignee: THE BOEING COMPANYInventors: Kapaleeswaran Viswanathan, Fred L. Templin, Gregory T. Cooper
-
Publication number: 20200014896Abstract: Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.Type: ApplicationFiled: September 19, 2019Publication date: January 9, 2020Inventors: Shubham TRIPATHI, Kapaleeswaran VISWANATHAN, Arun AYYAGARI
-
Publication number: 20190386823Abstract: An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.Type: ApplicationFiled: August 21, 2019Publication date: December 19, 2019Inventors: Kapaleeswaran VISWANATHAN, Fred L. TEMPLIN, Gregory T. COOPER
-
Patent number: 10447470Abstract: An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential that has not been revoked by an access granting authority. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.Type: GrantFiled: October 4, 2017Date of Patent: October 15, 2019Assignee: THE BOEING COMPANYInventors: Kapaleeswaran Viswanathan, Fred L. Templin, Gregory T. Cooper
-
Patent number: 10425625Abstract: Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.Type: GrantFiled: May 7, 2018Date of Patent: September 24, 2019Assignee: THE BOEING COMPANYInventors: Shubham Tripathi, Kapaleeswaran Viswanathan, Arun Ayyagari
-
Publication number: 20190246083Abstract: Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.Type: ApplicationFiled: May 7, 2018Publication date: August 8, 2019Inventors: Shubham TRIPATHI, Kapaleeswaran VISWANATHAN, Arun AYYAGARI
-
Patent number: 10326743Abstract: A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message.Type: GrantFiled: June 21, 2018Date of Patent: June 18, 2019Assignee: The Boeing CompanyInventors: Fred L. Templin, Kapaleeswaran Viswanathan
-
Publication number: 20190103960Abstract: An underwater communications system includes a network communication interface, one or more computer processors, and a memory containing computer program code that, when executed by operation of the one or more computer processors, performs an operation. The operation includes storing a plurality of data packets to be transmitted to a destination device, determining that data communications over the network communication interface have become available for a first network node, and determining that the first network node has a valid security credential that has not been revoked by an access granting authority. Additionally, the operation includes, upon determining that the first network node has the valid security credential, transmitting the stored plurality of data packets over the network communication interface to the first network node. The first network node is configured to employ store-carry-and-forward data messaging techniques to transmit the plurality of data packets towards the destination device.Type: ApplicationFiled: October 4, 2017Publication date: April 4, 2019Applicant: THE BOEING COMPANYInventors: Kapaleeswaran VISWANATHAN, Fred L. TEMPLIN, Gregory T. COOPER
-
Publication number: 20190052611Abstract: A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message.Type: ApplicationFiled: June 21, 2018Publication date: February 14, 2019Inventors: Fred L. Templin, Kapaleeswaran Viswanathan
-
Patent number: 10050946Abstract: A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message.Type: GrantFiled: June 17, 2016Date of Patent: August 14, 2018Assignee: The Boeing CompanyInventors: Fred L. Templin, Kapaleeswaran Viswanathan
-
Patent number: 9858016Abstract: In one example of the disclosure, a request for an authorization token is received via a network from a first computing device having authorization, to utilize functionality at a second computing device. The token is to provide for a third computing device a limited authorization to utilize the functionality. The token is sent to the third device. Subject data and the token are received from the third device. Validity of the token is confirmed. The subject data is sent to the second device for the second device to utilize the functionality in association with the subject data, with security accountability traceable to the first device.Type: GrantFiled: April 8, 2014Date of Patent: January 2, 2018Assignee: Hewlett-Packard Development Company, L.P.Inventors: Kapaleeswaran Viswanathan, Jitendra Kumar
-
Publication number: 20170366520Abstract: A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Fred L. Templin, Kapaleeswaran Viswanathan
-
Publication number: 20170068490Abstract: In one example of the disclosure, a request for an authorization token is received via a network from a first computing device having authorization, to utilize functionality at a second computing device. The token is to provide for a third computing device a limited authorization to utilize the functionality. The token is sent to the third device. Subject data and the token are received from the third device. Validity of the token is confirmed. The subject data is sent to the second device for the second device to utilize the functionality in association with the subject data, with security accountability traceable to the first device.Type: ApplicationFiled: February 26, 2014Publication date: March 9, 2017Inventors: Kapaleeswaran Viswanathan, Jitendra Kumar
-
Publication number: 20160156631Abstract: Systems and Methods for providing access control to files stored on a shared file storage platform in a multi-user environment are described herein. According to the present subject matter, the system(s) implement the described methods for receiving a request from a user device of a user from amongst a plurality of users, to perform an operation in relation to a file. Further determining a global unique identifier (GUID) associated with the file where the GUID uniquely distinguishes the file from other files based on contents of the file. The method further includes executing the requested operation in relation to the file based on an access reference graph (ARG), where the ARG provides an access control data structure to the files stored on the shared file storage platform, and where the ARG references the files stored on a shared file storage platform based on the GUID associated with each file.Type: ApplicationFiled: January 29, 2013Publication date: June 2, 2016Inventors: Kapaleeswaran VISWANATHAN, Arun Kumar GOPALAKRISHNANNAIR, Guruprasad B. KINI
-
Patent number: 9300467Abstract: A framework, device and method are disclosed for providing broadcast communication security over Ethernet within an automation system, wherein a security plug provides secure working of the automation system. The security plug can be implemented using ASIC/FPGA technology to provide compatibility with existing systems and an intuitive plug-and-play model. An exemplary system can address jitter-sensitivity by providing a real-time architecture, with minimal transmission latencies. The security plug can have separate security and communication modules that make provisions for protocol independent working of the security plug, within these networks. The method can include bootstrapping, secret key establishment and secure communication, for providing real-time guarantees.Type: GrantFiled: February 26, 2010Date of Patent: March 29, 2016Assignee: ABB RESEARCH LTDInventors: Kapaleeswaran Viswanathan, Wilhelm Wiese, Aswin Gopalan
-
Patent number: 9294447Abstract: A communication access control system (100) includes at least one access control cell (160), implemented on a computing entity, for computing random input addresses (205) and random output addresses (210) upon a request of a system user (105). The input and output addresses are based on a cryptographic key (165) held by a service facility (115) associated with the at least one access control cell (160).Type: GrantFiled: April 18, 2011Date of Patent: March 22, 2016Assignee: Hewlett-Packard Development Company, L.P.Inventors: Kapaleeswaran Viswanathan, Amitabh Saxena
-
Publication number: 20140040619Abstract: A communication access control system (100) includes at least one access control cell (160), implemented on a computing entity, for computing random input addresses (205) and random output addresses (210) upon a request of a system user (105). The input and output addresses are based on a cryptographic key (165) held by a service facility (115) associated with the at least one access control cell (160).Type: ApplicationFiled: April 18, 2011Publication date: February 6, 2014Applicant: Hewlett-Packard Development Company, L.P.Inventors: Kapaleeswaran Viswanathan, Amitabh Saxena
-
Patent number: 8477379Abstract: Presented is a method, for a participant in a secure document workflow, of generating workflow information for authenticating a document. The method comprises: receiving an image of the document; generating workflow information for the document image, including a document image descriptor dependent upon the appearance of the document image for later verifying the authenticity of a version of the document image that has been printed and scanned, the verification comprising electronically combining or comparing the document image descriptor with said version of the document image; generating a digital signature for later verifying the authenticity of the workflow information, the digital signature being derived from the workflow information using a cryptographic key associated with the participant; adding the digital signature to the workflow information; and communicating the document image and the workflow information to another workflow participant.Type: GrantFiled: December 2, 2009Date of Patent: July 2, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Kapaleeswaran Viswanathan, Anjaneyulu Seetha Rama Kuchibhotla, Nagabhushana Ayyanahal Matad
-
Publication number: 20110080618Abstract: Presented is a method, for a participant in a secure document workflow, of generating workflow information for authenticating a document. The method comprises: receiving an image of the document; generating workflow information for the document image, including a document image descriptor dependent upon the appearance of the document image for later verifying the authenticity of a version of the document image that has been printed and scanned, the verification comprising electronically combining or comparing the document image descriptor with said version of the document image; generating a digital signature for later verifying the authenticity of the workflow information, the digital signature being derived from the workflow information using a cryptographic key associated with the participant; adding the digital signature to the workflow information; and communicating the document image and the workflow information to another workflow participant.Type: ApplicationFiled: December 2, 2009Publication date: April 7, 2011Inventors: Kapaleeswaran VISWANATHAN, Anjaneyulu Seetha Rama Kuchibhotla, Nagabhushana Ayyanahal Matad